Technology Vendor Vulnerability Posture
This page offers a directory of technology vendors, allowing you to explore various product
vendors along with a detailed count of associated vulnerabilities. It serves as a valuable resource for
understanding the security posture of different technology providers, helping users make informed decisions
regarding their tech investments and cybersecurity strategies.
Vendor Name | Number of Product | Vulnerabilities | Type |
---|---|---|---|
Rajtestico project | 1 | 2 | Application |
Freshdevices | 1 | 1 | Application |
Perltidy project | 1 | 2 | Application |
Jv2design | 1 | 1 | Application |
Prestashop | 29 | 138 | Application |
Entity delete log project | 1 | 1 | Application |
Qxip | 1 | 1 | Application |
Openser | 2 | 5 | Application |
Jensenofscandinavia | 5 | 17 | Operating System |
Florian amrhein | 1 | 2 | Application |
Xuebook | 1 | 1 | Application |
Wpagecontact project | 1 | 1 | Application |
Adtran | 10 | 24 | Hardware |
Htmljunction | 2 | 2 | Application |
Ichain | 1 | 1 | Application |
Zongg | 1 | 1 | Application |
Yorba | 1 | 1 | Application |
Ht editor | 1 | 3 | Application |
Autocms project | 1 | 3 | Application |
Sammycage | 2 | 13 | Application |